Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 03:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
555c34022981c093f027b856e33bbdd3b39ebd1f681b6d360b68c125f99c23a7N.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
120 seconds
General
-
Target
555c34022981c093f027b856e33bbdd3b39ebd1f681b6d360b68c125f99c23a7N.dll
-
Size
1.0MB
-
MD5
ca8b0a9d8329f9aa50931f755aaa6610
-
SHA1
4a72e342ce38ff9155ccc4cbee40242a7db43e05
-
SHA256
555c34022981c093f027b856e33bbdd3b39ebd1f681b6d360b68c125f99c23a7
-
SHA512
12b6de6dc261e1abc1bcc1d6e701310d273154a706731725b241d8843f00468c8504ad324a8a63ceb947c4ab09655699c17d5d1a0d1c04ea069046cd64968c1c
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYu:o6RI1Fo/wT3cJYYYYYYYYYYYYu
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 3164 4552 rundll32.exe 83 PID 4552 wrote to memory of 3164 4552 rundll32.exe 83 PID 4552 wrote to memory of 3164 4552 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\555c34022981c093f027b856e33bbdd3b39ebd1f681b6d360b68c125f99c23a7N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\555c34022981c093f027b856e33bbdd3b39ebd1f681b6d360b68c125f99c23a7N.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3164
-